Re: Security risk of POP3 & IMAP protocols

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Alain Williams wrote, at 02/13/2009 10:30 AM:
> [23~On Fri, Feb 13, 2009 at 03:21:06PM +0000, Ian Eiloart wrote:
>>
>> --On 13 February 2009 14:35:43 +0000 Alain Williams <addw@xxxxxxxxxxxx> 
>> wrote:
>>
>>> That got me thinking ....
>>> I rate limit ssh connections to try to prevent dictionary attacks (3
>>> attempts/3 minutes/IP address). If I were to do the same with IMAP would
>>> that cause problems with some clients, ie are there some clients that to
>>> many connect/disconnects ?
>> Yes. Anything that opens a bunch of mailboxes at the same time might be 
>> doing way more than that. You should be measuring "failed attempts", not 
>> "attempts".
> 
> Yes, but I do the rate limiting with iptables (Linux firewall).
> I don't know how to feedback failed attempts to iptables.

I have yet to encounter an automated brute force attack that negotiates
STARTTLS, SSL or any of the more secure SASL mechanisms. In time, this
will probably change, but you will get more bang for your buck now if
you enforce encrypted connections. You can still run an unencrypted port
on localhost (or restrict access another way) if you need it for webmail.


----
Cyrus Home Page: http://cyrusimap.web.cmu.edu/
Cyrus Wiki/FAQ: http://cyrusimap.web.cmu.edu/twiki
List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list.html

[Index of Archives]     [Cyrus SASL]     [Squirrel Mail]     [Asterisk PBX]     [Video For Linux]     [Photo]     [Yosemite News]     [gtk]     [KDE]     [Gimp on Windows]     [Steve's Art]

  Powered by Linux